Dark Reading has an interesting article about how Target was compliant with PCI(Payment Card Industry) standards and it was not enough. The Point of Sale terminals…
On today’s Internet Storm Center Diary : Johannes noticed an odd attack coming from what turned out to be a DVR in China. This is a shape…
Unfortunately in this day, it is not enough to have a person on staff to handle your IT work, or even be in charge of…
Violent Python is a book by TJ. O’Connor. http://mirror7.meh.or.id/Programming/Violent_Python_A_Cookbook_for_Hackers_Forensic_Ana.pdf It is interesting how Python can use nmap and other opensource tools (metasploit) to probe and…
When trying to login to WordPress I got this message instead: (output started at public_html/wp-content/plugins/twitter/widget_twitter_vjck.php:171) in public_html/wp-includes/pluggable.php on line 896) Which is interesting to say…
It is a good idea to get in the habit of patching your systems consistently. Not wanting to reboot is sometimes a wish of all…
On patch Tuesday Microsoft has decided to roll up all the vulnerabilities found in the last month on one day, otherwise as each vulnerability gets…
Assessing Website structures, network infrastructure, and overall reviews of technology (wifi and anything computer related). The key with staying secure on the Internet is: Update…
In the last 25 years the most common vulnerabilities are? From VRT-Blog at snort.org Total vulnerabilities and highly critical vulnerabilities were up in 2012 after a significant…
CRN.com Website Has a discussion of a warning about an analysis about a new toolkit that makes it easier to create malware or other attacks on…